Langflow Unauth RCE Attack

Released: May 15, 2025

Updated: Jun 25, 2025


High Severity


AI builder for agentic applications targeted

FortiGuard Labs has observed a significant uptick in attacks targeting Langflow, leveraging a recently discovered authentication bypass vulnerability that allows unauthenticated remote attackers to fully compromise affected servers. Learn More »

Common Vulnerabilities and Exposures


Background

Langflow is a Python-based web application that offers a visual interface for building AI-driven agents and workflows. A critical authentication bypass vulnerability, identified as CVE-2025-3248, has been discovered in Langflow. This vulnerability allows remote, unauthenticated attackers to execute arbitrary code on affected instances by sending a specially crafted HTTP request with a malicious payload.

As AI workflows become increasingly prevalent across industries, the need to ensure the security of AI tools and applications has never been more critical. With the growing reliance on AI systems for decision-making, automation, and innovation, any vulnerability or breach in these systems could have far-reaching consequences.

Explore the current challenges, and discover how FortiAI seamlessly integrates security and transformation to safeguard your AI-driven operations.
https://www.fortinet.com/solutions/enterprise-midsize-business/fortiai

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


Organizations using Langflow in their AI development workflows are advised to upgrade to version 1.3.0.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • Lure

  • Decoy VM

  • IPS

  • Web App Security

DETECT
  • IOC

  • Outbreak Detection

  • Content Update

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Vulnerability Management

  • Attack Surface Monitoring (Inside & Outside)

  • Attack Surface Hardening

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.